首页 > 最新文献

2017 3rd International Conference on Computational Intelligence and Networks (CINE)最新文献

英文 中文
Modified Page Rank Algorithm: Efficient Version of Simple Page Rank with Time, Navigation and Synonym Factor 改进的页面排名算法:有效版本的简单页面排名与时间,导航和同义词因素
T. Sen, D. K. Chaudhary, T. Choudhury
The outburst growth and the wide accessibility of the internet has aroused gush of investigate motion in the area of information retrieval on the Web. Due to expansion of internet, it is necessary to remain locational competence to attract user needs. The internet provides a rich source of information which are surrounded has involvement of links and further of hyperlinks through which they are linked hence communicate. So idea of page ranking comes into picture to retrieve authentic data from the web. Its basic role is to calculate the priority and nature of web pages. This paper represents the revised version of page rank using the same classical recipe and added some more ingredients like time, backlinks, navigation, synonym to make it more tempting to the users which has inattentive limit as contrasted with vintage Page Rank Algorithm. Although a speedy for data extraction is yet in demand
互联网的迅猛发展和广泛的可及性引起了网络信息检索领域的研究热潮。由于互联网的扩张,必须保持位置竞争力,以吸引用户的需求。互联网提供了丰富的信息源,这些信息源被链接和超链接所包围,通过这些链接,它们被链接起来,从而交流。因此,网页排名的思想就被引入到图片中来,从网络中检索真实的数据。它的基本作用是计算网页的优先级和性质。本文采用传统的网页排名算法,并在此基础上增加了时间、反向链接、导航、同义词等因素,使其对用户更具吸引力,从而克服了传统的网页排名算法对用户注意力不集中的限制。尽管数据提取的速度还有待提高
{"title":"Modified Page Rank Algorithm: Efficient Version of Simple Page Rank with Time, Navigation and Synonym Factor","authors":"T. Sen, D. K. Chaudhary, T. Choudhury","doi":"10.1109/CINE.2017.24","DOIUrl":"https://doi.org/10.1109/CINE.2017.24","url":null,"abstract":"The outburst growth and the wide accessibility of the internet has aroused gush of investigate motion in the area of information retrieval on the Web. Due to expansion of internet, it is necessary to remain locational competence to attract user needs. The internet provides a rich source of information which are surrounded has involvement of links and further of hyperlinks through which they are linked hence communicate. So idea of page ranking comes into picture to retrieve authentic data from the web. Its basic role is to calculate the priority and nature of web pages. This paper represents the revised version of page rank using the same classical recipe and added some more ingredients like time, backlinks, navigation, synonym to make it more tempting to the users which has inattentive limit as contrasted with vintage Page Rank Algorithm. Although a speedy for data extraction is yet in demand","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy and Security of Cloud-Based Internet of Things (IoT) 基于云的物联网(IoT)的隐私和安全
T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore
The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.
物联网需要一个先进的安全原型,从整体的角度考虑安全问题,包括高级用户及其与该技术的交互。在本文中,分析和比较了目前的方法如何确保物联网的基本和基本安全要求和确保互联互通,以及未来该领域研究工作的滚动挑战和范围。云计算是当今一代先进的技术,服务是按利用率为基础提供给客户的。服务器在云上被用来外包其非常有价值的数据。尽管云计算有很多好处。然而,它有关键机密数据的安全线程。云技术的用户不能指望云服务供应商保证关键机密数据的安全。因此,需要一个第三方认证器,从用户或数据持有者的角度对云数据进行认证。由于存在各种实体,敏感数据的安全性存在问题。云服务提供商和数据用户同样有责任将关键机密数据的安全性置于风险之中。调查表明,庞大的存储系统不能完全信任;所有这些都可以被黑掉。
{"title":"Privacy and Security of Cloud-Based Internet of Things (IoT)","authors":"T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore","doi":"10.1109/CINE.2017.28","DOIUrl":"https://doi.org/10.1109/CINE.2017.28","url":null,"abstract":"The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An Acknowledgement Based System for Forest Fire Detection via Leach Algorithm 基于Leach算法的森林火灾识别系统
Shruti Gupta, Lekha Doshi
This paper presents an acknowledgement based system for disaster management by utilizing wireless sensor network, which sense the environmental change and based on that communicate between the nodes. For the communication purpose, Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm has been used. The LEACH algorithm is hierarchical in nature and therefore, helps in maintaining connection among the nodes, which leads to effective communication. Disaster is an activity, which can occur anytime and anywhere without prior information, which affects the whole mankind, human, animal and their prosperity. Since, disaster is a natural activity, no one can stop it, but a system can be developed to alert the people before the occurrence, so that many lives can be saved. The focus of this paper is towards utilizing the sensor network and LEACH algorithm for the development of an alert system, which works on the temperature. A threshold based mechanism is used to save the energy that is the system works only when the temperature reaches to its threshold value otherwise do not waste the energy by routing the data continuously.
本文提出了一种利用无线传感器网络感知环境变化并在此基础上进行节点间通信的基于识别的灾害管理系统。为了实现通信目的,采用了低能量自适应聚类层次(LEACH)算法。LEACH算法本质上是分层的,因此有助于保持节点之间的连接,从而实现有效的通信。灾难是一种随时随地都可能在没有事先信息的情况下发生的活动,它影响着整个人类、人类、动物及其繁荣昌盛。由于灾难是一种自然活动,没有人可以阻止它,但是可以开发一个系统在发生之前提醒人们,这样就可以挽救许多生命。本文的重点是利用传感器网络和LEACH算法来开发一个针对温度的报警系统。基于阈值的机制用于节省能量,即系统仅在温度达到其阈值时才工作,否则不会通过连续路由数据来浪费能量。
{"title":"An Acknowledgement Based System for Forest Fire Detection via Leach Algorithm","authors":"Shruti Gupta, Lekha Doshi","doi":"10.1109/CINE.2017.16","DOIUrl":"https://doi.org/10.1109/CINE.2017.16","url":null,"abstract":"This paper presents an acknowledgement based system for disaster management by utilizing wireless sensor network, which sense the environmental change and based on that communicate between the nodes. For the communication purpose, Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm has been used. The LEACH algorithm is hierarchical in nature and therefore, helps in maintaining connection among the nodes, which leads to effective communication. Disaster is an activity, which can occur anytime and anywhere without prior information, which affects the whole mankind, human, animal and their prosperity. Since, disaster is a natural activity, no one can stop it, but a system can be developed to alert the people before the occurrence, so that many lives can be saved. The focus of this paper is towards utilizing the sensor network and LEACH algorithm for the development of an alert system, which works on the temperature. A threshold based mechanism is used to save the energy that is the system works only when the temperature reaches to its threshold value otherwise do not waste the energy by routing the data continuously.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Palmprint Recognition Using Radon Transform and Relaxed Collaborative Representation Based Classifier 基于Radon变换和松弛协同表示分类器的掌纹识别
Soumee Guha, D. Basu, A. Chatterjee
A relatively new technology, palmprint recognition, has evolved drastically over the recent years. It is currently considered to be one of the potential research topics due to the escalating need of biometric authentication based security systems. This paper presents a method of authentication of hand images by relaxed collaborative representation (RCR) model of classification. It makes use of the similarity as well as uniqueness of the associated features. By computing the radon transform of the images, the feature vectors of the images are computed. The coding of each feature vector is done over the dictionary that is linked with RCR and in order to compute the resemblance among features the inconsistency of coding vectors is reduced. The main aim is to develop an efficient system whose results can be implemented on any database.
近年来,一项相对较新的技术——掌纹识别技术得到了巨大的发展。由于对基于生物识别认证的安全系统的需求不断增加,它目前被认为是一个潜在的研究课题。提出了一种基于RCR分类模型的手部图像认证方法。它利用了关联特征的相似性和唯一性。通过计算图像的radon变换,计算图像的特征向量。每个特征向量的编码是在与RCR链接的字典上进行的,为了计算特征之间的相似性,减少了编码向量的不一致性。主要目的是开发一个有效的系统,其结果可以在任何数据库上实现。
{"title":"Palmprint Recognition Using Radon Transform and Relaxed Collaborative Representation Based Classifier","authors":"Soumee Guha, D. Basu, A. Chatterjee","doi":"10.1109/CINE.2017.26","DOIUrl":"https://doi.org/10.1109/CINE.2017.26","url":null,"abstract":"A relatively new technology, palmprint recognition, has evolved drastically over the recent years. It is currently considered to be one of the potential research topics due to the escalating need of biometric authentication based security systems. This paper presents a method of authentication of hand images by relaxed collaborative representation (RCR) model of classification. It makes use of the similarity as well as uniqueness of the associated features. By computing the radon transform of the images, the feature vectors of the images are computed. The coding of each feature vector is done over the dictionary that is linked with RCR and in order to compute the resemblance among features the inconsistency of coding vectors is reduced. The main aim is to develop an efficient system whose results can be implemented on any database.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 3rd International Conference on Computational Intelligence and Networks (CINE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1